Section – I:1)Explain why the performance of an Ethernet LAN decreases with an increase in the number of stations on the LAN, whereas it increases (at least initially) with the increase in the number of stations in a token-ring LAN? A)There are too many differences between Token Ring and Ethernet to list out here. You could read more about it from many useful search results for "ethernet vs. token ring." I'll point out a key difference and give you a source answering your question on performance.

Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection), meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However, there might be multiple stations sending a free carrier and send the data at the same time, causing "collision." Collision is the main factor affecting ethernet's performance. The more stations on the same LAN, the higher the collision rate, the lower the performance.

Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out of its performance. 2)What are the standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable? A)The standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol are :

...NetworkManagement Software
Choosing the right platform for your networkmanagement system (NMS) can be difficult, even daunting. It's important to choose the right system for the needs of your particular organization. Networkmanagement can include single administrator managing a single LAN or a team of analysts spread around the country or even the world maintaining a large and complex WAN. In order to properly decide on a NMS that meets the current and future needs of your organization there are some basic features that one should look for when you begin your search.
The first thing to look for is a simple, and more importantly a single easy to use interface. Having to switch between screens can lead to missing important data or information about your network. Ideally everything should be easy to read and access from a single interface. The chosen system should also have the ability to set a baseline. This may seem trivial and basic, but without the ability to set a realistic and readable baseline for your network then you can't really manage your network effectively. Another important feature to look for is auto discovery. Your NMS software should have the ability to send out packets over your network so that network devices can be added to your system without direct user input. You should also...

...The importance of Network Security
Networks are very vulnerable to many types of attacks. These can be mitigated but not prevented and it’s different for every single company. Network Security must have a specific goal for the enterprise that must be achieved. If your database contains thousands of credit card numbers, then authenticating and authorizing access to protected servers and protecting the whole network from all intrusion attempts is necessary. This is where security comes in.
Security is relative; there is nothing completely secure. If someone wants something you have and they have the time, money and resources available, they will obtain it. If they can’t obtain it by knowledge or stealth, they could try a different method such as brute force. Like I said before, nothing is completely secure. All you can do is create protection layers and verify the security implementations. You better do this often and maintain all your systems updated to keep them as safe as possible.
Let’s talk about the difference between Hackers and Crackers. Hackers are the good boys. They are who play with the software codes in order to understand how it works. They are not malicious; they can often be very helpful. They find potential problems in software that could be fixed in order to make it fulfill its purpose. Crackers not try to gain knowledge but they try to gain wealth. They want what others have and use technology...

...Internet Standard Management Framework
Introduction:
TCP/IP networkmanagement functions are most normally connected with the key protocol responsible for implementing the Simple NetworkManagement Protocol (SNMP). Many people have heard of SNMP, and it is common for SNMP to be considered the way that networkmanagement is performed in TCP/IP. This is true to an extent, but is really an overview. The actual SNMP protocol is only one part of a higher-level networkmanagement strategy called the Internet Standard Management Framework. In order to really understand how SNMP works, we need to first have some experience on the way this networkmanagement is structured as a whole.
The Internet Standard Management Framework includes all of the technologies that comprise the TCP/IP networkmanagement solution. The SNMP Framework consists of a number of architectural components that defines how management information is planned, how it is stored, and how it is exchanged using the SNMP protocol. This Framework is derived from and builds upon both the original Internet-standard Management Framework (SNMPv1) and the second Internet-standard Management Framework...